|
|||||
View general information Description The subject within the syllabus as a whole Professional fields to which it applies Prior knowledge Learning objectives and results Content View the UOC learning resources used in the subject Guidelines on assessment at the UOC View the assessment model | |||||
This is the course plan for the second semester of the academic year 2023/2024. To check whether the course is being run this semester, go to the Virtual Campus section More UOC / The University / Programmes of study section on Campus. Once teaching starts, you'll be able to find it in the classroom. The course plan may be subject to change. | |||||
Error control codes are used to detect and correct errors that may occur in data transmission or storage through eventually defective channels or storage devices that can distort the sent or stored information. For example, the atmosphere introduces errors in the transmission of images from the Meteosat satellite to Earth, different interferences in a communication by mobile phone may cause transmission errors, or reading devices need correcting algorithms for handling CDs, DVDs or USB memories. Error control codes are also used in distributed data storage in the clouds to recover lost or damaged chunks of information. In this course we will introduce Reed-Solomon codes, nowadays the most used codes, the CRC codes used in mobile cell phone networks, cordless phones, USB memories, Gzip, Bzip2 and other software systems, as well as the LRC codes used by the Microsoft team in their Windows Azure. |
|||||
This subject is an optative subject of the first semester. It has continuity with the subject of Cryptography of the second semester. |
|||||
Software engineering, electronic devices and cloud storage systems. |
|||||
Basic mathematics knowledge (Mathematics or Engineering Bachelor's degree) |
|||||
- Knowing the notions of divisibility, prime numbers and greatest common divisor. Knowing how to factor an integer and to determine its primality and knowinh how to calculate the greatest common divisor of two integers. - Knowing how to manipulate integer congruences and the rings Zm. Knowing how to operate with polynomials. - Knowing how to manipulate finite fields. - Knowing the basic notions of information theory and the meaning of the discipline. - Having an idea of the notion of noisy channel, as well as of the problem of error detection and correction. - Knowing the notions of block code, Hamming distance, code length and error correcting capacity. - Knowing the notion of linear code and knowing how to manipulate the generator and parity check matrices of a linear code. - Knowing how to apply error correction by syndromes. - Knowing cyclic codes and understanding the notion of generator polynomial. Knowing how to do the basic operations of a cyclic code using the generator polynomial. - Knowing how to build and how to operate with algebraic, Reed Solomon and BCH codes. - Knowing the CRC and LRC codes. - Having an idea of other applications. |
|||||
1. Arithmetic and Finite Fields: a) Divisibility, prime numbers, greatest common divisor and Euclid's algorithm. b) Congruences. Rings Zm. Polynomials, divisibility of polynomials, primitive elements. c) Finite fields. 2. Information coding (classical): a) Information theory. Noisy channels. b) Block codes. Length and correction capacity. c) Linear codes. Generator matrix and parith check matrix. Correction of errors by syndrome. d) Cyclic codes. Generator polynomial. e) Algebraic codes. Reed-Solomon and BCH codes. 3. Information coding (advanced) Diverse applications of the Reed-Solomon codes CRC and LRC codes |
|||||
|
|||||
The assessment process is based on the student's personal work and presupposes authenticity of authorship and originality of the exercises completed. Lack of authenticity of authorship or originality of assessment tests, copying or plagiarism, the fraudulent attempt to obtain a better academic result, collusion to copy or concealing or abetting copying, use of unauthorized material or devices during assessment, inter alia, are offences that may lead to serious academic or other sanctions. Firstly, you will fail the course (D/0) if you commit any of these offences when completing activities defined as assessable in the course plan, including the final tests. Offences considered to be misconduct include, among others, the use of unauthorized material or devices during the tests, such as social media or internet search engines, or the copying of text from external sources (internet, class notes, books, articles, other students' essays or tests, etc.) without including the corresponding reference. And secondly, the UOC's academic regulations state that any misconduct during assessment, in addition to leading to the student failing the course, may also lead to disciplinary procedures and sanctions. The UOC reserves the right to request that students identify themselves and/or provide evidence of the authorship of their work, throughout the assessment process, and by the means the UOC specifies (synchronous or asynchronous). For this purpose, the UOC may require students to use a microphone, webcam or other devices during the assessment process, and to make sure that they are working correctly. The checking of students' knowledge to verify authorship of their work will under no circumstances constitute a second assessment. |
|||||
|